Movatterモバイル変換


[0]ホーム

URL:


US20080189796A1 - Method and apparatus for deferred security analysis - Google Patents

Method and apparatus for deferred security analysis
Download PDF

Info

Publication number
US20080189796A1
US20080189796A1US11/672,428US67242807AUS2008189796A1US 20080189796 A1US20080189796 A1US 20080189796A1US 67242807 AUS67242807 AUS 67242807AUS 2008189796 A1US2008189796 A1US 2008189796A1
Authority
US
United States
Prior art keywords
file
security
application
machine
act
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/672,428
Other versions
US8181264B2 (en
Inventor
Christopher S. Linn
Jacques Vidrine
Aaron Sigel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apple Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US11/672,428priorityCriticalpatent/US8181264B2/en
Assigned to APPLE INC.reassignmentAPPLE INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SIGEL, AARON, VIDRINE, JACQUES, LINN, CHRIS
Publication of US20080189796A1publicationCriticalpatent/US20080189796A1/en
Application grantedgrantedCritical
Publication of US8181264B2publicationCriticalpatent/US8181264B2/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

It has been discovered that identifying files introduced into a system, particularly those originating from external sources, as being subject to security evaluation and deferring the security evaluation until access or attempted access of the file reduces security vulnerabilities of a system. A file introduced into a processing system is tagged with a security tag if the file is introduced via a supervised introduction point and/or introduced by a supervised program. Upon access or attempted access of the tagged file, security evaluation is initiated on the file.

Description

Claims (33)

US11/672,4282007-02-072007-02-07Method and apparatus for deferred security analysisExpired - Fee RelatedUS8181264B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US11/672,428US8181264B2 (en)2007-02-072007-02-07Method and apparatus for deferred security analysis

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US11/672,428US8181264B2 (en)2007-02-072007-02-07Method and apparatus for deferred security analysis

Publications (2)

Publication NumberPublication Date
US20080189796A1true US20080189796A1 (en)2008-08-07
US8181264B2 US8181264B2 (en)2012-05-15

Family

ID=39677314

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US11/672,428Expired - Fee RelatedUS8181264B2 (en)2007-02-072007-02-07Method and apparatus for deferred security analysis

Country Status (1)

CountryLink
US (1)US8181264B2 (en)

Cited By (30)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20080244747A1 (en)*2007-03-302008-10-02Paul GleichaufNetwork context triggers for activating virtualized computer applications
US20080295179A1 (en)*2007-05-242008-11-27Sandisk Il Ltd.Apparatus and method for screening new data without impacting download speed
US20100153474A1 (en)*2008-12-162010-06-17Sandisk Il Ltd.Discardable files
US20100153452A1 (en)*2008-12-162010-06-17Judah Gamliel HahnDiscardable files
US20100180091A1 (en)*2008-12-162010-07-15Judah Gamliel HahnDiscardable files
US20100228795A1 (en)*2008-12-162010-09-09Judah Gamliel HahnDownload management of discardable files
US20100235473A1 (en)*2009-03-102010-09-16Sandisk Il Ltd.System and method of embedding second content in first content
US20100333155A1 (en)*2009-06-302010-12-30Philip David RoyallSelectively using local non-volatile storage in conjunction with transmission of content
US20110004737A1 (en)*2009-07-022011-01-06Kenneth GreenebaumMethod and apparatus for protected content data processing
WO2011154215A1 (en)*2010-06-082011-12-15F-Secure CorporationAnti-virus application and method
US8375192B2 (en)2008-12-162013-02-12Sandisk Il Ltd.Discardable files
US8463802B2 (en)2010-08-192013-06-11Sandisk Il Ltd.Card-based management of discardable files
US8549229B2 (en)2010-08-192013-10-01Sandisk Il Ltd.Systems and methods for managing an upload of files in a shared cache storage system
US20140044258A1 (en)*2012-03-312014-02-13Karanvir S. GrewalMethods and systems for cryptographic access control of video
US8788849B2 (en)2011-02-282014-07-22Sandisk Technologies Inc.Method and apparatus for protecting cached streams
US9020993B2 (en)2008-12-162015-04-28Sandisk Il Ltd.Download management of discardable files
WO2015116819A1 (en)*2014-01-312015-08-06Crowdstrike, Inc.Tagging security-relevant system objects
US9104686B2 (en)2008-12-162015-08-11Sandisk Technologies Inc.System and method for host management of discardable objects
US9292881B2 (en)2012-06-292016-03-22Crowdstrike, Inc.Social sharing of security information in a group
US9531745B1 (en)2015-11-202016-12-27International Business Machines CorporationCrowd-sourced security analysis
US9544327B1 (en)2015-11-202017-01-10International Business Machines CorporationPrioritizing security findings in a SAST tool based on historical security analysis
US9571453B2 (en)2012-06-082017-02-14Crowdstrike, Inc.Kernel-level security agent
US9798882B2 (en)2014-06-062017-10-24Crowdstrike, Inc.Real-time model of states of monitored devices
US10289405B2 (en)2014-03-202019-05-14Crowdstrike, Inc.Integrity assurance and rebootless updating during runtime
US10339316B2 (en)2015-07-282019-07-02Crowdstrike, Inc.Integrity assurance through early loading in the boot phase
US10387228B2 (en)2017-02-212019-08-20Crowdstrike, Inc.Symmetric bridge component for communications between kernel mode and user mode
US10409980B2 (en)2012-12-272019-09-10Crowdstrike, Inc.Real-time representation of security-relevant system state
US10631168B2 (en)*2018-03-282020-04-21International Business Machines CorporationAdvanced persistent threat (APT) detection in a mobile device
US10740459B2 (en)2017-12-282020-08-11Crowdstrike, Inc.Kernel- and user-level cooperative security processing
US11507269B2 (en)*2020-04-212022-11-22AppEsteem CorporationTechnologies for indicating third party content and resources on mobile devices

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8635701B2 (en)*2008-03-022014-01-21Yahoo! Inc.Secure browser-based applications
US8392379B2 (en)*2009-03-172013-03-05Sophos PlcMethod and system for preemptive scanning of computer files
US20110154493A1 (en)*2009-12-182011-06-23Assured Information Security, Inc.Methods for inspecting data and devices thereof
US8695060B2 (en)*2011-10-102014-04-08Openpeak Inc.System and method for creating secure applications
US9350818B2 (en)2014-09-052016-05-24Openpeak Inc.Method and system for enabling data usage accounting for unreliable transport communication
US20160071040A1 (en)2014-09-052016-03-10Openpeak Inc.Method and system for enabling data usage accounting through a relay
US9232013B1 (en)2014-09-052016-01-05Openpeak Inc.Method and system for enabling data usage accounting
US8938547B1 (en)2014-09-052015-01-20Openpeak Inc.Method and system for data usage accounting in a computing device
US9100390B1 (en)2014-09-052015-08-04Openpeak Inc.Method and system for enrolling and authenticating computing devices for data usage accounting
US9699205B2 (en)*2015-08-312017-07-04Splunk Inc.Network security system

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6757685B2 (en)*2001-02-192004-06-29Hewlett-Packard Development Company, L.P.Process for executing a downloadable service receiving restrictive access rights to at least one profile file
US20060021029A1 (en)*2004-06-292006-01-26Brickell Ernie FMethod of improving computer security through sandboxing
US20060241712A1 (en)*2005-04-202006-10-26Cardiac Pacemakers, Inc.Method and apparatus for indication-based programming of cardiac rhythm management devices

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8060860B2 (en)2005-04-222011-11-15Apple Inc.Security methods and systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6757685B2 (en)*2001-02-192004-06-29Hewlett-Packard Development Company, L.P.Process for executing a downloadable service receiving restrictive access rights to at least one profile file
US20060021029A1 (en)*2004-06-292006-01-26Brickell Ernie FMethod of improving computer security through sandboxing
US20060241712A1 (en)*2005-04-202006-10-26Cardiac Pacemakers, Inc.Method and apparatus for indication-based programming of cardiac rhythm management devices

Cited By (48)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20080244747A1 (en)*2007-03-302008-10-02Paul GleichaufNetwork context triggers for activating virtualized computer applications
US8127412B2 (en)*2007-03-302012-03-06Cisco Technology, Inc.Network context triggers for activating virtualized computer applications
US20080295179A1 (en)*2007-05-242008-11-27Sandisk Il Ltd.Apparatus and method for screening new data without impacting download speed
US8533847B2 (en)*2007-05-242013-09-10Sandisk Il Ltd.Apparatus and method for screening new data without impacting download speed
US20100153452A1 (en)*2008-12-162010-06-17Judah Gamliel HahnDiscardable files
US20100228795A1 (en)*2008-12-162010-09-09Judah Gamliel HahnDownload management of discardable files
US20100180091A1 (en)*2008-12-162010-07-15Judah Gamliel HahnDiscardable files
US9020993B2 (en)2008-12-162015-04-28Sandisk Il Ltd.Download management of discardable files
US9015209B2 (en)2008-12-162015-04-21Sandisk Il Ltd.Download management of discardable files
US8849856B2 (en)2008-12-162014-09-30Sandisk Il Ltd.Discardable files
US9104686B2 (en)2008-12-162015-08-11Sandisk Technologies Inc.System and method for host management of discardable objects
US8375192B2 (en)2008-12-162013-02-12Sandisk Il Ltd.Discardable files
US8205060B2 (en)2008-12-162012-06-19Sandisk Il Ltd.Discardable files
US20100153474A1 (en)*2008-12-162010-06-17Sandisk Il Ltd.Discardable files
US20100235473A1 (en)*2009-03-102010-09-16Sandisk Il Ltd.System and method of embedding second content in first content
US20100235329A1 (en)*2009-03-102010-09-16Sandisk Il Ltd.System and method of embedding second content in first content
US20100333155A1 (en)*2009-06-302010-12-30Philip David RoyallSelectively using local non-volatile storage in conjunction with transmission of content
US8225061B2 (en)2009-07-022012-07-17Apple Inc.Method and apparatus for protected content data processing
US8539182B2 (en)2009-07-022013-09-17Apple Inc.Method and apparatus for protected content data processing
US20110004737A1 (en)*2009-07-022011-01-06Kenneth GreenebaumMethod and apparatus for protected content data processing
WO2011154215A1 (en)*2010-06-082011-12-15F-Secure CorporationAnti-virus application and method
US8463802B2 (en)2010-08-192013-06-11Sandisk Il Ltd.Card-based management of discardable files
US8549229B2 (en)2010-08-192013-10-01Sandisk Il Ltd.Systems and methods for managing an upload of files in a shared cache storage system
US8788849B2 (en)2011-02-282014-07-22Sandisk Technologies Inc.Method and apparatus for protecting cached streams
US9094733B2 (en)*2012-03-312015-07-28Intel CorporationMethods and systems for cryptographic access control of video
US20140044258A1 (en)*2012-03-312014-02-13Karanvir S. GrewalMethods and systems for cryptographic access control of video
US9621515B2 (en)2012-06-082017-04-11Crowdstrike, Inc.Kernel-level security agent
US10853491B2 (en)2012-06-082020-12-01Crowdstrike, Inc.Security agent
US10002250B2 (en)2012-06-082018-06-19Crowdstrike, Inc.Security agent
US9904784B2 (en)2012-06-082018-02-27Crowdstrike, Inc.Kernel-level security agent
US9571453B2 (en)2012-06-082017-02-14Crowdstrike, Inc.Kernel-level security agent
US9858626B2 (en)2012-06-292018-01-02Crowdstrike, Inc.Social sharing of security information in a group
US9292881B2 (en)2012-06-292016-03-22Crowdstrike, Inc.Social sharing of security information in a group
US10409980B2 (en)2012-12-272019-09-10Crowdstrike, Inc.Real-time representation of security-relevant system state
WO2015116819A1 (en)*2014-01-312015-08-06Crowdstrike, Inc.Tagging security-relevant system objects
US20170163686A1 (en)*2014-01-312017-06-08Crowdstrike, Inc.Processing Security-Relevant Events using Tagged Trees
US10015199B2 (en)*2014-01-312018-07-03Crowdstrike, Inc.Processing security-relevant events using tagged trees
US11340890B2 (en)2014-03-202022-05-24Crowdstrike, Inc.Integrity assurance and rebootless updating during runtime
US10289405B2 (en)2014-03-202019-05-14Crowdstrike, Inc.Integrity assurance and rebootless updating during runtime
US9798882B2 (en)2014-06-062017-10-24Crowdstrike, Inc.Real-time model of states of monitored devices
US10339316B2 (en)2015-07-282019-07-02Crowdstrike, Inc.Integrity assurance through early loading in the boot phase
US9544327B1 (en)2015-11-202017-01-10International Business Machines CorporationPrioritizing security findings in a SAST tool based on historical security analysis
US9531745B1 (en)2015-11-202016-12-27International Business Machines CorporationCrowd-sourced security analysis
US9779252B2 (en)2015-11-202017-10-03International Business Machines CorporationCrowd-sourced security analysis
US10387228B2 (en)2017-02-212019-08-20Crowdstrike, Inc.Symmetric bridge component for communications between kernel mode and user mode
US10740459B2 (en)2017-12-282020-08-11Crowdstrike, Inc.Kernel- and user-level cooperative security processing
US10631168B2 (en)*2018-03-282020-04-21International Business Machines CorporationAdvanced persistent threat (APT) detection in a mobile device
US11507269B2 (en)*2020-04-212022-11-22AppEsteem CorporationTechnologies for indicating third party content and resources on mobile devices

Also Published As

Publication numberPublication date
US8181264B2 (en)2012-05-15

Similar Documents

PublicationPublication DateTitle
US8181264B2 (en)Method and apparatus for deferred security analysis
JP7460696B2 (en) Real-time detection and protection from malware and steganography in kernel mode
US11620383B2 (en)Dynamic analysis techniques for applications
US10691792B2 (en)System and method for process hollowing detection
US11604878B2 (en)Dynamic analysis techniques for applications
US10599841B2 (en)System and method for reverse command shell detection
US10382468B2 (en)Malware identification via secondary file analysis
US10291634B2 (en)System and method for determining summary events of an attack
KR101626424B1 (en)System and method for virtual machine monitor based anti-malware security
US9251343B1 (en)Detecting bootkits resident on compromised computers
RU2531861C1 (en)System and method of assessment of harmfullness of code executed in addressing space of confidential process
Baliga et al.Detecting kernel-level rootkits using data structure invariants
US8590045B2 (en)Malware detection by application monitoring
US9405899B2 (en)Software protection mechanism
US11960598B2 (en)Runtime memory protection (RMP) engine
US8984629B2 (en)Apparatus and method for preemptively protecting against malicious code by selective virtualization
Botacin et al.The other guys: automated analysis of marginalized malware
WO2017012241A1 (en)File inspection method, device, apparatus and non-volatile computer storage medium
CN106372507A (en)Method and device for detecting malicious document
US10645099B1 (en)Malware detection facilitated by copying a memory range from an emulator for analysis and signature generation
US7644271B1 (en)Enforcement of security policies for kernel module loading
EP2417552B1 (en)Malware determination
US12437073B2 (en)Systems and methods for countering persistent malware
Boyton et al.Forensic Investigation of Ransomware Activities—Part 2
OlowoyeyeEvaluating Open Source Malware Sandboxes with Linux malware

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:APPLE INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LINN, CHRIS;VIDRINE, JACQUES;SIGEL, AARON;REEL/FRAME:019197/0012;SIGNING DATES FROM 20070202 TO 20070205

Owner name:APPLE INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LINN, CHRIS;VIDRINE, JACQUES;SIGEL, AARON;SIGNING DATES FROM 20070202 TO 20070205;REEL/FRAME:019197/0012

FEPPFee payment procedure

Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

ZAAANotice of allowance and fees due

Free format text:ORIGINAL CODE: NOA

ZAABNotice of allowance mailed

Free format text:ORIGINAL CODE: MN/=.

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FPAYFee payment

Year of fee payment:4

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20240515


[8]ページ先頭

©2009-2025 Movatter.jp